Scholarly Research Excellence

Digital Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29143


Select areas to restrict search in scientific publication database:
9888
Learning User Keystroke Patterns for Authentication
Authors:
Abstract:
Keystroke authentication is a new access control system to identify legitimate users via their typing behavior. In this paper, machine learning techniques are adapted for keystroke authentication. Seven learning methods are used to build models to differentiate user keystroke patterns. The selected classification methods are Decision Tree, Naive Bayesian, Instance Based Learning, Decision Table, One Rule, Random Tree and K-star. Among these methods, three of them are studied in more details. The results show that machine learning is a feasible alternative for keystroke authentication. Compared to the conventional Nearest Neighbour method in the recent research, learning methods especially Decision Tree can be more accurate. In addition, the experiment results reveal that 3-Grams is more accurate than 2-Grams and 4-Grams for feature extraction. Also, combination of attributes tend to result higher accuracy.
Digital Object Identifier (DOI):

References:

[1] C. C. Aggarwal. Re-designing distance functions and distance-based applications for high dimensional data. SIGMOD Rec., 30(1):13-18, 2001.
[2] S. Aha and D. Kibler. Instance based learning algorithms. Machine Learning, 6:37-66, 1991.
[3] L. C. Arajo, L. H. S. Jr., M. G. Lizrraga, L. L. Ling, and J. B. Yabuuti. User authentication through typing biometrics features. In First International Conference on Biometric Authentication, volume 3072, pages 694-700. Springer, 2004.
[4] Ashbourn and D. M. Julian. Biometrics: Advanced Identity Verification: The Complete Guide. Springer-Verlag UK, 2000.
[5] F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur., 5(4):367-397, 2002.
[6] S. Bleha, C. Slivinsky, and B. Hussien. Computer-access security systems using keystroke dynamics. In IEEE Transactions on Pattern Analysis and Machine Intelligence, volume 12, pages 1217-1222, 1990.
[7] S. Haider, A. Abbas, and A. Zaidi. A multi-technique approach for user identification through keystroke dynamics. In IEEE International Conference on Systems, Man and Cybernetics, volume 2, pages 1336- 1341, 2000.
[8] R. C. Holte. Very simple classification rules perform well on most commonly used datasets. Machine Learning, 11:63-91, 1993.
[9] D. P. Huttenlocher and K. Kedem. Computing the minimum hausdorff distance for point sets under translation. In Proceedings of the sixth annual symposium on Computational geometry, pages 340-349. ACM Press, 1990.
[10] C. G. John and T. E. Leonard. K*: An instance-based learner using an entropic distance measure. In Proceedings of the 12th International Conference on Machine Learning, pages 108-114. Morgan Kaufmann, 1995.
[11] G. H. John and P. Langley. Estimating continuous distributions in bayesian classifiers. In Eleventh Conference on Uncertainty in Artificial Intelligence, pages 338-345. Morgan Kaufmann Publisher, 1995.
[12] R. Kohavi. The power of decision tables. In Proceedings of the 8th European Conference on Machine Learning, volume 912 of LNAI, pages 174-189. Springer, 1995.
[13] P. Langley and S. Sage. Tractable average-case analysis of naive bayesian classifiers. In Eleventh Conference on Uncertainty in Artificial Intelligence, pages 220-228. Morgan Kaufmann Publisher, 1999.
[14] D.-T. Lin. Computer-access authentication with neural network based keystroke identity verification. In IEEE Transaction on Neural Networks, volume 1, pages 174-178, 1997.
[15] U. V. Luxburg and O. Bousquet. Distance-based classification with lipschitz functions. J. Mach. Learn. Res., 5:669-695, 2004.
[16] T. M. Mitchell. Machine Learning. McGraw-Hill, New York, 1997.
[17] F. Monrose, M. K. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. In Proceedings of the 6th ACM conference on Computer and communications security, volume 6, pages 73-82. ACM Press, 1999.
[18] F. Monrose and A. Rubin. Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security, volume 2, pages 48-56. ACM Press, 1997.
[19] M. S. Obaidat. A verification methodology for computer systems users. In Proceedings of the 1995 ACM symposium on Applied computing, pages 258-262. ACM Press, 1995.
[20] M. S. Obaidat and B. Sadoun. Verification of computer users using keystroke dynamics. In IEEE Transaction on Systems, Man and Cybernetics, part B, volume 27, pages 261-269, 1997.
[21] R. Quinlan. C4.5: Programs for Machine Learning. San Mateo, CA: Morgan Kaufmann, 1993.
[22] J. Robinson, V. Liang, J. Chambers, and C. MacKenzie. Computer user verification using login string keystroke dynamics. In IEEE Transaction on Systems, Man and Cybernetics, Part A, volume 28, pages 236-241, 1998.
[23] D. R. W.G and E. J.H.P. Enhanced password authentication through fuzzy logic. In IEEE Expert, volume 12, pages 38-45, 1997.

Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007